Access Manager

This cool solution explains a basic Access Manager configuration and event generation for using Analytics Server. To use the Analytics Server feature, first you need to configure Access Manager. Then run the attached script to send requests to Access Manager, so that audit events are sent to the Analytics Server. Based on the events…

Dec 5, 2016
12:12 pm
Reads:
38
Score:
Unrated

Access Manager can retrieve an attribute from an external resource and transform it before using this value with assertion and access policies. This feature supports user attribute modifications like transform value to uppercase etc., In some of the cases, the user information needs to be retrieved from a third party server from REST endpoint….

By: cstumula
Dec 5, 2016
12:10 pm
Reads:
33
Score:
Unrated

In this example environment, your Sentinel server is configured as an Audit Server for Access Manager, and Sentinel is used for all your enterprise auditing needs. But you also want to use the new Analytics Server for Access Manager-specific visual analytics. The Analytics Server filters and analyzes the events that are generated from the…

Dec 5, 2016
12:09 pm
Reads:
40
Score:
Unrated

Detailed log files are great for troubleshooting. But if they get too large, you’re going to have a bigger problem than what you’re using the log files for – troubleshooting. If the log files consume the disk, you’re in a world of hurt, along with unnecessarily alarming the infrastructure team…

Nov 30, 2016
11:54 am
Reads:
119
Score:
Unrated

With Access Manager 4.3, you will get an out-of-box Audit Server, default Reports, and Analytics Dashboard. This new capability can be achieved by installing a new appliance. If you already have an auditing infrastructure, you can forward raw events to this new appliance and use “Analytics Dashboard”.

Nov 22, 2016
7:47 am
Reads:
210
Score:
4.5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
129
Score:
Unrated

Join the webinar on December 1, 2016. Like the title says, I’m a control freak—a true, blue, self-professed “control freak”. Whether its work, home, or play, I need to feel in charge of what I’m doing in all situations. I’m a working mom that thrives on multi-tasking. I clean before the…

Nov 17, 2016
10:57 am
Reads:
134
Score:
5

This cool solution provides information for various methods used in the mobile application development world. This is all about how the application will authenticate the user and how this information is shared with other applications without compromising credentials.

By: cstumula
Oct 25, 2016
3:05 pm
Reads:
204
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
966
Score:
4
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow